AI News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

AI Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
AINewsDangerous WebRAT Malware Now Being Spread by GitHub Repositories
Dangerous WebRAT Malware Now Being Spread by GitHub Repositories
AI

Dangerous WebRAT Malware Now Being Spread by GitHub Repositories

•December 24, 2025
0
TechRadar
TechRadar•Dec 24, 2025

Companies Mentioned

GitHub

GitHub

Kaspersky

Kaspersky

Discord

Discord

Telegram

Telegram

Why It Matters

The incident highlights how trusted code‑hosting platforms can be weaponized to infiltrate security professionals, amplifying supply‑chain risk and demanding stricter vetting of third‑party code. It underscores the evolving threat of AI‑crafted malware that can bypass traditional detection mechanisms.

Key Takeaways

  • •15 GitHub repos disguised as PoC exploits contain WebRAT
  • •Dropper rasmanesc.exe disables Defender, installs backdoor/infostealer
  • •Gen AI used to generate fake exploit documentation
  • •Targets security researchers and typo‑squatted packages
  • •GitHub removed repos; victims must manually eradicate WebRAT

Pulse Analysis

The rise of supply‑chain attacks has pushed attackers to exploit the credibility of popular development hubs. GitHub, with its massive user base, offers an attractive vector for malicious actors who can embed harmful code in seemingly legitimate repositories. By leveraging generative AI, these criminals produce convincing proof‑of‑concept write‑ups that lure security researchers and developers into downloading malicious payloads, blurring the line between legitimate research and infection vectors.

Technical analysis of the WebRAT campaign reveals a multi‑stage payload. The initial ZIP archive contains a decoy DLL and a batch script, but the core component is rasmanesc.exe, a dropper that escalates privileges, disables Windows Defender, and fetches the WebRAT backdoor. Once active, WebRAT functions as both an infostealer and surveillance tool, exfiltrating credentials from platforms like Steam, Discord, and Telegram, stealing cryptocurrency wallet data, and even capturing webcam footage. Its modular design allows rapid adaptation to new targets, making it a potent threat for any compromised system.

GitHub’s swift removal of the fifteen malicious repositories mitigates further spread, yet the incident serves as a cautionary tale for the broader developer community. Organizations must enforce strict verification of third‑party code, employ reproducible builds, and monitor for typosquatted packages. Security teams should also educate researchers on the risks of downloading unverified PoC exploits. As AI lowers the barrier for creating convincing malicious artifacts, continuous vigilance and layered defenses become essential to protect the software supply chain.

Dangerous WebRAT malware now being spread by GitHub repositories

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...